Predicting network attack patterns in SDN using machine learning approach

S Nanda, F Zafari, C DeCusatis… - … IEEE Conference on …, 2016 - ieeexplore.ieee.org
An experimental setup of 32 honeypots reported 17M login attempts originating from 112
different countries and over 6000 distinct source IP addresses. Due to decoupled control …

[PDF][PDF] NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.

Y Ye, Z Zhang, F Wang, X Zhang, D Xu - NDSS, 2021 - cs.purdue.edu
Network protocol reverse engineering is an important challenge with many security
applications. A popular kind of method leverages network message traces. These methods …

Leveraging machine learning approach to setup software-defined network (SDN) controller rules during DDoS attack

S Sen, KD Gupta, M Manjurul Ahsan - Proceedings of International Joint …, 2020 - Springer
A machine learning based Distributed Denial of Service (DDoS) attack detection system,
implemented in a virtual SDN environment testbed, has been presented in this paper. This …

Diversify to survive: Making passwords stronger with adaptive policies

SM Segreti, W Melicher, S Komanduri… - … symposium on usable …, 2017 - usenix.org
Password-composition policies are intended to increase resistance to guessing attacks by
requiring certain features (eg, a minimum length and the inclusion of a digit). Sadly, they …

Graph clustering and anomaly detection of access control log for forensic purposes

H Studiawan, C Payne, F Sohel - Digital Investigation, 2017 - Elsevier
Attacks on operating system access control have become a significant and increasingly
common problem. This type of security threat is recorded in a forensic artifact such as an …

Where The Wild Things Are:{Brute-Force}{SSH} Attacks In The Wild And How To Stop Them

SK Singh, S Gautam, C Cartier, S Patil… - 21st USENIX Symposium …, 2024 - usenix.org
SSH (Secure Shell) is widely used for remote access to systems and cloud services. This
access comes with the persistent threat of SSH password-guessing brute-force attacks …

ProsegDL: Binary protocol format extraction by deep learning-based field boundary identification

S Zhao, J Wang, S Yang, Y Zeng… - 2022 IEEE 30th …, 2022 - ieeexplore.ieee.org
Protocol reverse engineering can be applied to various security applications, including
fuzzing, malware analysis, and intrusion detection. It aims to acquire an unknown protocol's …

An exploration of graphical password authentication for children

H Assal, A Imran, S Chiasson - International Journal of Child-Computer …, 2018 - Elsevier
In this paper, we explore graphical passwords as a child-friendly alternative for user
authentication. We evaluate the usability of three variants of the PassTiles graphical …

Refined detection of SSH brute-force attackers using machine learning

K Hynek, T Beneš, T Čejka, H Kubátová - ICT Systems Security and …, 2020 - Springer
This paper presents a novel approach to detect SSH brute-force (BF) attacks in high-speed
networks. Contrary to host-based approaches, we focus on network traffic analysis to identify …

Honeynet data analysis and distributed SSH brute-force attacks

GK Sadasivam, C Hota, B Anand - Towards Extensible and Adaptable …, 2018 - Springer
Due to the increase in the number of network attacks, it has become essential to gain deeper
insight into the malicious activities carried out by the attackers. In this paper, the authors …